Research Article
Stochastic Differential Game-Based Malware Propagation in Edge Computing-Based IoT
Algorithm 1
The stochastic game algorithm for the defenders and attackers (the optimal strategies for the defenders and attackers).
| | Input: ; | | | Output: optimal state trajectory and optimal strategies ; | | (1) | Initialize game parameters , and ; | | (2) | Set the rate parameters ; | | (3) | For = 0 to ; | | (4) | If the infected nodes 0 | | (5) | Response the defense mechanism; | | (6) | Calculate the optimal state trajectory in equation (4); | | (7) | Calculate the optimal strategies in equation (21); | | (8) | Analyze the influence of parameters on the optimal strategies; | | (9) | Else | | (10) | t = t + 1; | | (11) | End if | | (12) | Update and store it; | | (13) | End for; | | (14) | Return . |
|